x0rz is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

x0rz @x0rz@mastodon.social

Pinned toot

Tweets are automatically forwarded from twitter.com/x0rz

Linux and Android are not doing that great at HTTPS (probably because there's a lot of deprecated versions still running) transparencyreport.google.com/ t.co/4yUmda02EN

This is really impressive 🤓
Unreal Engine: Reflections Real-Time Ray Tracing Demo
youtube.com/watch?time_continu

Hey @eff, now that the "FUD-clickbait-embargo" period is over, could you update that? ssd.eff.org/en/module/how-use- t.co/XitvQpEtKG

Another case of remote car compromise (GSM to CAN bus RCE): Security Assessment of BMW Cars by @keen_lab keenlab.tencent.com/en/Experim (PDF) t.co/ojyI3pnvRu

I uploaded the slides of the talk about 'Hacking Back' I gave at @EsieaSecEdit blog.0day.rocks/current-state-

Almost like that Windows XP wallpaper 😎 t.co/fSILRilT25

In the vines, Bourgogne, France 🇫🇷 t.co/dZhm6xpIPy

FWIW, French is now on YouTube (looks like a recruiting campaign aimed at infosec/comsec/IT people) youtube.com/watch?v=AZrn7NGOMJ

If you like debunking fake videos, be sure to subscribe to @cdisillusion YT channel 👍 youtube.com/watch?v=-NPmBkYb_m

I think this is precisely the reason why TLP RED / AMBER exist

About hacking back (re: ZooPark dump), IMO Kaspersky failed to protect the victims here, burning a *working* C2 containing victims data is careless t.co/hVI1oGMNYK

MFW a mobile geolocation provider gets breached t.co/IC8M2qhGMJ

Soooooo... some random internal CIA project was on GitHub and went unnoticed for months. Wow, what else is there to find? thedailybeast.com/exclusive-ci